US20070061869A1 - Access of Internet use for a selected user - Google Patents

Access of Internet use for a selected user Download PDF

Info

Publication number
US20070061869A1
US20070061869A1 US11/491,918 US49191806A US2007061869A1 US 20070061869 A1 US20070061869 A1 US 20070061869A1 US 49191806 A US49191806 A US 49191806A US 2007061869 A1 US2007061869 A1 US 2007061869A1
Authority
US
United States
Prior art keywords
internet
computer
activity
internet access
remote server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/491,918
Inventor
Ronald DeHaas
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Covenant Eyes Inc
Original Assignee
Dehaas Ronald J
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dehaas Ronald J filed Critical Dehaas Ronald J
Priority to US11/491,918 priority Critical patent/US20070061869A1/en
Publication of US20070061869A1 publication Critical patent/US20070061869A1/en
Assigned to COVENANT EYES, INC. reassignment COVENANT EYES, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DEHAAS, RONALD J.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Definitions

  • the present invention generally relates to a computer program and system, which blocks access to Internet use, and for providing a means for a remote server, and optionally a second computer connected to that remote server, to unblock and permit access to the Internet, for example, on a time interval basis; the computer system provides a means for blocking or permitting the access of Internet use of a selected user to which the program is installed, and more particularly to provide accountability for and unblocking and permitting Internet use, said permission to be allowed by an accountability partner through a remote server.
  • the computer program is configured to block connections for multiple Internet access activities, such as web browsing, file sharing programs, news groups, chat rooms, peer to peer chats, cell phone or PDA transmissions, and electronic mail file transfer protocols, sent and received, and the like, and is also configured to be unblocked by a remote server.
  • U.S. Pat. No. 6,804,334 describes a method and device for dynamic message delivery based upon the identification of an originating caller. Specifically, the originating caller for an incoming call is identified and compared to a list of callers, where each caller within the list of callers is associated with one of a plurality of dispositions, the dispositions including accept, reject and forwarding of an incoming call. The incoming call is routed based upon the disposition associated with the identified originating caller. In the case of a subscriber utilizing a dial-up Internet account, a message is sent to the subscriber via the Internet connection alerting the subscriber that an incoming call is present and offering the subscriber various disposition options.
  • one of the embodiments of this invention states that providers may use the system for each caller within the list of callers is associated with one of a plurality of dispositions, the dispositions including accept, reject and forwarding of an incoming call via an Internet connection, it does not describe how the system could be adapted for use disclosed above, but mainly describes the use as applied to telecommunication.
  • Site specific Internet usage monitoring programs are also generally known in the art. Such monitoring programs may be installed by employers or parents to monitor the web sites visited by employees or children respectively. It may also be desirable to monitor web sites accessed by other persons under a variety of different circumstances. Involuntary applications of these types of programs are often used by employers. The employee has no choice but to accept the monitoring activity on the computer since they have no expectation of privacy for business owned systems. In a voluntary monitoring system, the user knowingly and voluntarily has the monitoring program installed on a particular computer to monitor his Internet activities. The user may even select one or more third party recipients to receive, or have access to a report containing a record of the Internet activity of the computer user. For example, U.S. Pat. No.
  • 6,606,657 to Zilbertstein, et al. describes a system to gather and report detailed information on a user's web site visitation.
  • a server system is connected to the Internet and receives, processes and supplies detailed user information such as the sites visited and the duration and times of such visits.
  • Such information is gathered and transmitted to subscribers who have reporting and communicating software installed.
  • the users submit profile information about themselves. Demographic information as to the popularity of visited web sites may then be easily determined, stored and updated by the server.
  • This demographic information may be provided to other users, or web site operators and advertisers.
  • the invention disclosed also allows users to initiate chat sessions with other users visiting a particular web site, or post a virtual note on the site for other subscribers to read.
  • a disadvantage to this invention is that most of the web monitoring information is provided to the website owners and operators not the users.
  • U.S. Pat. No. 6,449,604 to Hansen, et al. describes a system for displaying information on the Web page usage. Statistical information and usage analysis produced by this invention is available to owners and web-site operators. A disadvantage to this invention is that it focuses on website use, not a user's usage.
  • U.S. Pat. No. 6,052,730 to Feliciano, et al. discloses a method for monitoring web browsing activities that does not require modification or reconfiguration of client software, and does not require information from other servers. Complete tracking of a client browsing session is allowed, including detailed link usage, page visits, and the sequence in which the accessing took place. The invention also allows such tracking information to be generated and recorded through the use of a single server.
  • the disadvantage to this invention is that the method is transparent to the client browser.
  • U.S. Pat. No. 6,397,256 to Chan, et al. describes a device for transmitting browser activity to a monitoring unit.
  • the monitoring unit is remotely located from the Internet access unit and coupled to the transmission device, the monitoring unit including a display for viewing, and recording Internet activity of the Internet access unit.
  • the system may be activated via a remote command module and may include a password protected interface on the Internet browser (via the software plug-in).
  • this system is fairly complicated in that it requires an installed transmission adapter card.
  • an invention is disclosed in which a third-party delegated administrator has the ability to remotely (through a server) configure a user's Internet monitoring program in such a way that it locks out the user from using “features” that could be used to bypass the software.
  • the invention has the disadvantage of allowing, by default, the user to have access to all Internet protocols, and thereby requiring the third party proactively to selectively block each protocol; as the third party may not be aware of all the protocols, or as new protocols are available, the user could readily and regularly have access to unmonitored protocols, which would therefore provide no effective control by the third party.
  • This invention also has another disadvantage of not providing predetermined times at which specific Internet protocols may be accessed.
  • the present invention provides a means of unblocking and permitting Internet use of a particular computer user including web browsing activity, file sharing program access, news group access, chat room activity, peer to peer chat activity, file transfer protocol access, and e-mails sent and received.
  • the system and method of the present invention relates to a computer program and system for providing unblocking, accountability, monitoring, and optionally, recording Internet use of a selected user.
  • the computer system provides a means for blocking or permitting the access of Internet use of a selected user to which the program is installed, and more particularly to provide accountability for and unblocking of Internet use.
  • the computer program is configured to monitor and/or permit connections for multiple Internet access activities, such as web browsing, file sharing programs, news groups, chat rooms, peer to peer chats, cell phone or PDA transmission, and electronic mail, file transfer protocols, sent and received, and the like.
  • Internet access activities such as web browsing, file sharing programs, news groups, chat rooms, peer to peer chats, cell phone or PDA transmission, and electronic mail, file transfer protocols, sent and received, and the like.
  • a system for permitting Internet use of a selected computer user includes a remote server and a computer communicatively connected to the remote server.
  • the program is configured to permit or deny Internet access activity of the computer user and may record the Internet access activity on the remote server.
  • the Internet access activity includes at least one Internet protocol from the group consisting of http, https, network news transfer protocols, file sharing programs, file transfer protocols, chat room access, peer to peer chat access and electronic mail activity.
  • a method of permitting Internet use of a selected computer user includes the steps of: a user installing a program on the computer, the program linked to a remote server, the program is configured to block all Internet access unless Internet access is permitted by the remote server.
  • Internet access includes at least one Internet protocol from the group consisting of http, https, newsgroup access, file sharing programs, file transfer protocols, chat room activity, peer to peer chat activity and electronic mail activity; monitoring the Internet access activity; and recording the Internet access activity on a first database located within a remote server.
  • a system for permitting Internet access of a selected computer user includes a remote server and a computer communicatively connected to the remote server having a monitoring program installed thereon.
  • the monitoring program is configured to monitor Internet access activity of the computer user and record the activity on the remote server.
  • the Internet access activity includes access to at least one Internet protocol from the group consisting of hyper text transfer protocol, https, network news transfer protocol, file sharing programs, file transfer protocol, chat rooms, peer to peer chats, cell phone or PDA transmissions, and electronic mail.
  • the remote server is further configured to generate a report including a plurality of portions, and each portion containing a list of the recorded Internet access activity of one of the Internet protocols.
  • the portions may further include a computer link to connect to another of the plurality of portions.
  • a method of reporting permitted Internet use of a selected computer user includes the steps of: a user voluntarily installing an Internet monitoring program on the computer, the program being configured to monitor Internet access activity of the user; monitoring the Internet access activity; generating a report of the Internet access activity, the report including a plurality of portions; and providing a link on one portion of the report to electronically connect to at least one other portion of the report, wherein each of the plurality of portions contain information on Internet access of different Internet protocols.
  • FIG. 1 is a schematic of a hardware that can be used to implement the objectives of the current invention.
  • FIG. 2 is a flow diagram for a system for access of internet use for a selected user in accordance with the present invention.
  • the present invention can be realized as methods or systems in hardware, software, or a combination of hardware and software of a computer system including a computer network system.
  • the present invention can be realized in a centralized fashion in one computer system or in a distributed fashion where different elements are spread across several computer systems. Any kind of computer system, or other apparatus adapted for carrying out the methods described herein, is suited.
  • a typical combination of hardware and software may include a general purpose computer system with a computer program that, when being loaded and executed, controls the computer system such that it carries out the systems and methods described herein.
  • Cell phones, PDA's and other similar products can also be a computer system capable of carrying out the objects of the present invention.
  • the present invention may also be voluntarily embedded in a computer program product (or any computer useable medium having computer readable program code embodied therein), which comprises all the features enabling the implementation of the methods and systems described herein and which when loaded in a computer system is able to carry out these systems and methods.
  • Computer program or computer program product in the present context means any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following: (a) conversion to another language, code or notation, and (b) reproduction in a different material or electronic form.
  • the present invention specifically relates to an Internet system for the provision of accountability for and unblocking of Internet use of a selected user.
  • the use of a particular computer user including http, https, all other web browsing activity, file sharing program access, news group access, chat room activity, file transfer programs access, e-mails sent and received, and the like, and providing a report to a third party recipient.
  • This type of Internet system may provide a user of a computer with said program and system installed with a method to minimize temptations to engage in Internet access activities considered objectionable. If the user knows an accountability partner will have to permit access and may optionally report on his Internet access activity, thus eliminating the secrecy of the activity, he may refrain from such objectionable activity.
  • the present invention also provides reporting features superior to existing means of blocking and accessing Internet use, thus enhancing its usefulness and effectiveness.
  • the report generated in the present invention is capable of reporting the Internet access activity of the user and may also provide a link on one portion of the report to allow the user to computerlink to and access information related to different Internet protocol activities on different portions of the report.
  • the software may be installed by down-loading the program directly from a remote server through an Internet connection or other suitable means, or may alternatively be installed manually by way of a pre-recorded media, such as a compact disc (CD).
  • a pre-recorded media such as a compact disc (CD).
  • the user may make certain pre-installation elections such as who will have the ability to unblock and permit access, who will be the recipient of information gathered with the program, how often reports will be updated and made available to either the user or a accountability partner, as well as other key parameters that will be discussed in more detail below.
  • this computer is communicatively connected to a server through an electronic connection, such as telephone lines, cable, fiber optics, electric power lines, or other suitable connection.
  • an electronic connection such as telephone lines, cable, fiber optics, electric power lines, or other suitable connection.
  • the user will be unable to gain access to the Internet without first establishing a connection with remote server, and without that server unblocking or permitting access as predetermined by accountability partner.
  • the user may elect to have an automatic connection to remote server and thus always be available for unblocking of access to the Internet by the remote server.
  • the server permits access (at the direction of the Accountability Partner), the user may or may not have a prompt display on the screen of computer indicating that a password is required to enter the Internet. This password would then connect the first computer to remote server.
  • the remote server may include any personal computer or other hardware system available and known in the art. Server may be a single server or include a “server cluster” containing multiple servers.
  • all Internet access activity of the user can optionally be recorded by the monitoring program onto the remote server.
  • These activities may include the traditional web site protocols, such as hyper text transfer protocol (http) (i.e., web browsing activities), in addition to other protocols not presently able to be monitored by existing monitoring programs.
  • http hyper text transfer protocol
  • These other protocols may include protocols used in file sharing programs (gnutella, fast track and other like programs), news group access or network news transfer protocol (nntp), chat room activity and peer to peer chats, file transfer protocols (ftp), and protocols for reading e-mail such as post office protocol 3 (pop3) and Internet message access protocol (IMAP), cell-phone and PDA (personal digital assistant protocol) and protocols for writing or sending emails such as simple mail transfer protocol (smtp).
  • the system may be reconfigured to add monitoring and reporting capabilities for those as well. These may be added as program updates, new releases and the like.
  • the Internet access activity being monitored may be routed over the Internet, compiled then stored in remote server or in a database contained within remote server.
  • the information processing performed by processing program may include sorting the access activity of the user, assembling a list of the Internet access activity, and assigning a score to each activity listed.
  • a score may be assigned as a numeric indicator of the type of activity accessed. For instance, for a particular type of objectionable Internet activity accessed a high numeric score may be assigned such as a number between 15 and 20. Likewise, a non-objectionable Internet access activity may be assigned a low number such as 0 or 1.
  • An analysis program within the processing program may analyze the Internet access activity and assign a score based on parameters such as key words and image content.
  • the user or recipient can pre-select key words and/or other selected parameters to use for scoring purposes.
  • a program will run for that particular user that assigns the score to the Internet access activity listed in accordance with the desired scoring for that user. For example, the user or recipient may select words to be given a high numeric score (i.e., words considered objectionable to that user or recipient), and words to be given a low numeric score.
  • a variety of other scoring parameters may be included such as scoring based on the time of day (or night) the user engaged in Internet access activity, or the size of the file accessed by the user. Again, the score may be higher for activities logged late at night as opposed to during the day.
  • the numeric scoring may be replaced with a relative scoring system. Under this type of scoring method, for a particular activity a letter or other symbol may be used that designates whether the activity is deemed objectionable or not.
  • the comment section may allow the user to type in a comment after engaging in a particular Internet access activity. For example, if the user conducted research for a school report, and visited a web site considered objectionable to the user, he may later access the report of that activity within remote server and type in a comment explaining the visit to that site. The comment may then appear on the report to alert the third party recipient of the reason for the activity listed on the report.
  • this invention can be used, for example, to allow a parolee to have access only at times permitted by a remote parole officer; or to allow a pornography addict to call his Accountability Partner to allow access only on an as-needed basis to the Internet; or for a child to allow parents to establish appropriate times of Internet use; or other applications as may be appropriate.
  • Implementation could, for example, be for the Accountability Partner using any computer in the world with internet access to go to the Covenant Eyes Member Center, https://secure.cvnt.net/member/,Log In, and have a menu of selection for the User, which would permit the Accountability Partner to choose the amount of permitted time access, the times of day the access is permitted, whether such access is to be on a regular basis, and which Internet protocols are permitted.
  • the Accountability Partner could provide his/her password by telephone, or by other electronic means.
  • FIG. 1 is a schematic of a hardware configuration that can be used to implement the objectives of the present invention.
  • the system has a first computer that is a user computer 20 that is communicatively connected at 30 to a server 22 by any networking means such as the Internet.
  • Server 22 have a database and is similarly communicatively attached to a second computer 24 for use by an accountability partner.
  • user computer 20 is also communicatively attached to any data source 26 received through any type of Internet protocol.
  • computer means any device that can process digital information such as a personal computer, PDA, cell-phone, and the like.
  • Step 40 is shown a flow of a system that embodies the objectives of the present invention.
  • the system starts at Step 40 and proceeds to Step 42 where the program installs on User Computer 20 .
  • the system proceeds to Step 44 where the system accesses Server 22 database so that at Step 46 Server 22 can verify user authenticity in Server 22 database.
  • Step 48 Server 22 accesses its database to apply User computer 20 Internet access parameters from a pre-determined or subsequently-determined list received from the Accountability Partner Computer.
  • the system then waits for User Computer to make an access request, which is found at Step 50 .
  • Step 52 When an access request is received by the system from User Computer 20 , the system proceeds to Step 52 where Server 22 compares the request to the preset access parameters. The system then proceeds to Step 54 to determine if the request falls within the list of allowed access sites. If yes, the system proceeds to Step 56 where access to the site is allowed per the predetermined parameters (such as a time interval). If no at Step 54 , the System proceeds to Step 58 where access to the site is denied.
  • the system at Step 58 may at Step 60 optionally record the request and the denial, which is either accessible or reported to the Accountability Partner Computer 24 then return back to Step 50 until the system is terminated.
  • the system at Step 56 may at Step 62 optionally record the request and the access, which is either accessible or reported to the Accountability Partner Computer 24 then return back to Step 50 until the system is terminated.

Abstract

A system for the provision of accountability for and blocking of Internet use of a selected computer user. The system includes a computer which has Internet access blocked, a remote server, and a second computer at which an Accountability Partner communicates to the remote server, such that Internet access is permitted to the person using the first computer. The Internet access activity includes access of at least one Internet protocol from the group consisting of newsgroups, file sharing programs, file transfer programs, chat rooms, peer to peer chats cell phone or PDA transmissions, http, https, and electronic mail activity.

Description

    CLAIM OF PRIORITY
  • This Application claims priority to and the benefit of U.S. Provisional Application No. 60/701,938, filed Jul. 25, 2005, which is incorporated by reference herein in its entirety.
  • FIELD OF THE INVENTION
  • The present invention generally relates to a computer program and system, which blocks access to Internet use, and for providing a means for a remote server, and optionally a second computer connected to that remote server, to unblock and permit access to the Internet, for example, on a time interval basis; the computer system provides a means for blocking or permitting the access of Internet use of a selected user to which the program is installed, and more particularly to provide accountability for and unblocking and permitting Internet use, said permission to be allowed by an accountability partner through a remote server. The computer program is configured to block connections for multiple Internet access activities, such as web browsing, file sharing programs, news groups, chat rooms, peer to peer chats, cell phone or PDA transmissions, and electronic mail file transfer protocols, sent and received, and the like, and is also configured to be unblocked by a remote server.
  • BACKGROUND OF INVENTION
  • Although it would be desirable or even necessary to block access to objectionable material from some users in web sites and the like, this is often not possible as a practical matter. However, such blocking may either compulsorily or voluntarily permit the usage of a selected computer Internet access or in some case televisions by a selected third party recipient, such as an accountability partner of a particular user of web sites or channels accessed.
  • U.S. Pat. No. 6,804,334 describes a method and device for dynamic message delivery based upon the identification of an originating caller. Specifically, the originating caller for an incoming call is identified and compared to a list of callers, where each caller within the list of callers is associated with one of a plurality of dispositions, the dispositions including accept, reject and forwarding of an incoming call. The incoming call is routed based upon the disposition associated with the identified originating caller. In the case of a subscriber utilizing a dial-up Internet account, a message is sent to the subscriber via the Internet connection alerting the subscriber that an incoming call is present and offering the subscriber various disposition options. Although one of the embodiments of this invention states that providers may use the system for each caller within the list of callers is associated with one of a plurality of dispositions, the dispositions including accept, reject and forwarding of an incoming call via an Internet connection, it does not describe how the system could be adapted for use disclosed above, but mainly describes the use as applied to telecommunication.
  • Site specific Internet usage monitoring programs are also generally known in the art. Such monitoring programs may be installed by employers or parents to monitor the web sites visited by employees or children respectively. It may also be desirable to monitor web sites accessed by other persons under a variety of different circumstances. Involuntary applications of these types of programs are often used by employers. The employee has no choice but to accept the monitoring activity on the computer since they have no expectation of privacy for business owned systems. In a voluntary monitoring system, the user knowingly and voluntarily has the monitoring program installed on a particular computer to monitor his Internet activities. The user may even select one or more third party recipients to receive, or have access to a report containing a record of the Internet activity of the computer user. For example, U.S. Pat. No. 6,606,657 to Zilbertstein, et al., describes a system to gather and report detailed information on a user's web site visitation. Here, a server system is connected to the Internet and receives, processes and supplies detailed user information such as the sites visited and the duration and times of such visits. Such information is gathered and transmitted to subscribers who have reporting and communicating software installed. In addition, the users submit profile information about themselves. Demographic information as to the popularity of visited web sites may then be easily determined, stored and updated by the server. This demographic information, in turn, may be provided to other users, or web site operators and advertisers. The invention disclosed also allows users to initiate chat sessions with other users visiting a particular web site, or post a virtual note on the site for other subscribers to read. A disadvantage to this invention is that most of the web monitoring information is provided to the website owners and operators not the users.
  • U.S. Pat. No. 6,449,604 to Hansen, et al. describes a system for displaying information on the Web page usage. Statistical information and usage analysis produced by this invention is available to owners and web-site operators. A disadvantage to this invention is that it focuses on website use, not a user's usage. U.S. Pat. No. 6,052,730 to Feliciano, et al. discloses a method for monitoring web browsing activities that does not require modification or reconfiguration of client software, and does not require information from other servers. Complete tracking of a client browsing session is allowed, including detailed link usage, page visits, and the sequence in which the accessing took place. The invention also allows such tracking information to be generated and recorded through the use of a single server. The disadvantage to this invention is that the method is transparent to the client browser.
  • U.S. Pat. No. 6,397,256 to Chan, et al. describes a device for transmitting browser activity to a monitoring unit. The monitoring unit is remotely located from the Internet access unit and coupled to the transmission device, the monitoring unit including a display for viewing, and recording Internet activity of the Internet access unit. The system may be activated via a remote command module and may include a password protected interface on the Internet browser (via the software plug-in). Unfortunately, this system is fairly complicated in that it requires an installed transmission adapter card.
  • At http://safebrowse.com/press release/01.31.05 an invention is disclosed in which a third-party delegated administrator has the ability to remotely (through a server) configure a user's Internet monitoring program in such a way that it locks out the user from using “features” that could be used to bypass the software. The invention has the disadvantage of allowing, by default, the user to have access to all Internet protocols, and thereby requiring the third party proactively to selectively block each protocol; as the third party may not be aware of all the protocols, or as new protocols are available, the user could readily and regularly have access to unmonitored protocols, which would therefore provide no effective control by the third party. This invention also has another disadvantage of not providing predetermined times at which specific Internet protocols may be accessed. Thus, it would be desirable to have a program that does not require proactive measures by the third-party Accountability Partner to block access (by the user) to any Internet protocol, but which instead blocks access, as the default position, to all Internet protocols, thereby requiring proactive permission by the third party, and which instead allows the Accountability Partner (the third party), through a server, to selectively allow access only to selected protocols, either upon request of the user, or at predetermined times.
  • While the voluntary programs currently available in the art are configured to monitor or block web sites accessed by the computer user, they do not offer the capability of a computer user to always have all Internet usage blocked, with the concomitant ability for an accountability partner, by means of a remote server, to unblock Internet activities, either completely or selectively, resulting from use of http, https, or other protocols, such as access to file share programs, news groups, chat rooms, peer to peer chats, cell phone or PDA transmissions, and electronic mail file transfer protocols, for example, pre-selected or on request time intervals.
  • Although there is known in the art various means to monitor computer use, there is a desire and need in the art to provide a method of blocking Internet activities of a particular computer user including web browsing activity, file share programs use, news group access, chat room activity, peer to peer chat activities, file transfer protocol use, e-mails sent and received, and the like, in a way such as to allow an accountability partner of a user to unblock, and selectively allow, access to Internet activities resulting from use of http, https, or other protocols, such as access to file share programs, news groups, chat rooms, peer to peer chats, file transfer protocols, and e-mails. This blocking and unblocking could then be recorded and the record made available to not only the user, but also to a third party recipient. There is a further need to provide an Internet monitoring program capable of generating and providing a report having information related to the above described Internet activities.
  • SUMMARY OF INVENTION
  • Accordingly, the present invention provides a means of unblocking and permitting Internet use of a particular computer user including web browsing activity, file sharing program access, news group access, chat room activity, peer to peer chat activity, file transfer protocol access, and e-mails sent and received. Currently there are a limited number of ways to block and unblock access to objectionable material from users in web sites and the like. The system and method of the present invention relates to a computer program and system for providing unblocking, accountability, monitoring, and optionally, recording Internet use of a selected user. The computer system provides a means for blocking or permitting the access of Internet use of a selected user to which the program is installed, and more particularly to provide accountability for and unblocking of Internet use.
  • The computer program is configured to monitor and/or permit connections for multiple Internet access activities, such as web browsing, file sharing programs, news groups, chat rooms, peer to peer chats, cell phone or PDA transmission, and electronic mail, file transfer protocols, sent and received, and the like.
  • In one embodiment of the present invention, a system for permitting Internet use of a selected computer user includes a remote server and a computer communicatively connected to the remote server. The program is configured to permit or deny Internet access activity of the computer user and may record the Internet access activity on the remote server. The Internet access activity includes at least one Internet protocol from the group consisting of http, https, network news transfer protocols, file sharing programs, file transfer protocols, chat room access, peer to peer chat access and electronic mail activity.
  • In another embodiment of the present invention, a method of permitting Internet use of a selected computer user includes the steps of: a user installing a program on the computer, the program linked to a remote server, the program is configured to block all Internet access unless Internet access is permitted by the remote server. Internet access includes at least one Internet protocol from the group consisting of http, https, newsgroup access, file sharing programs, file transfer protocols, chat room activity, peer to peer chat activity and electronic mail activity; monitoring the Internet access activity; and recording the Internet access activity on a first database located within a remote server.
  • In yet another embodiment of the present invention, a system for permitting Internet access of a selected computer user includes a remote server and a computer communicatively connected to the remote server having a monitoring program installed thereon. The monitoring program is configured to monitor Internet access activity of the computer user and record the activity on the remote server. The Internet access activity includes access to at least one Internet protocol from the group consisting of hyper text transfer protocol, https, network news transfer protocol, file sharing programs, file transfer protocol, chat rooms, peer to peer chats, cell phone or PDA transmissions, and electronic mail. The remote server is further configured to generate a report including a plurality of portions, and each portion containing a list of the recorded Internet access activity of one of the Internet protocols. The portions may further include a computer link to connect to another of the plurality of portions.
  • In still another embodiment of the present invention a method of reporting permitted Internet use of a selected computer user includes the steps of: a user voluntarily installing an Internet monitoring program on the computer, the program being configured to monitor Internet access activity of the user; monitoring the Internet access activity; generating a report of the Internet access activity, the report including a plurality of portions; and providing a link on one portion of the report to electronically connect to at least one other portion of the report, wherein each of the plurality of portions contain information on Internet access of different Internet protocols.
  • Other features of the present invention will become more apparent to persons having ordinary skill in the art to which the present invention pertains from the following description and claims.
  • BRIEF DESCRIPTION OF THE FIGURES
  • The foregoing features, as. well as other features, will become apparent with reference to the description and figures below, in which like numerals represent elements, and in which:
  • FIG. 1 is a schematic of a hardware that can be used to implement the objectives of the current invention; and
  • FIG. 2 is a flow diagram for a system for access of internet use for a selected user in accordance with the present invention.
  • DETAILED DESCRIPTION OF THE INVENTION
  • In general, the present invention can be realized as methods or systems in hardware, software, or a combination of hardware and software of a computer system including a computer network system. The present invention can be realized in a centralized fashion in one computer system or in a distributed fashion where different elements are spread across several computer systems. Any kind of computer system, or other apparatus adapted for carrying out the methods described herein, is suited. A typical combination of hardware and software may include a general purpose computer system with a computer program that, when being loaded and executed, controls the computer system such that it carries out the systems and methods described herein. Cell phones, PDA's and other similar products can also be a computer system capable of carrying out the objects of the present invention. The present invention may also be voluntarily embedded in a computer program product (or any computer useable medium having computer readable program code embodied therein), which comprises all the features enabling the implementation of the methods and systems described herein and which when loaded in a computer system is able to carry out these systems and methods.
  • Computer program or computer program product in the present context means any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following: (a) conversion to another language, code or notation, and (b) reproduction in a different material or electronic form.
  • The present invention specifically relates to an Internet system for the provision of accountability for and unblocking of Internet use of a selected user. The use of a particular computer user including http, https, all other web browsing activity, file sharing program access, news group access, chat room activity, file transfer programs access, e-mails sent and received, and the like, and providing a report to a third party recipient. This type of Internet system, may provide a user of a computer with said program and system installed with a method to minimize temptations to engage in Internet access activities considered objectionable. If the user knows an accountability partner will have to permit access and may optionally report on his Internet access activity, thus eliminating the secrecy of the activity, he may refrain from such objectionable activity.
  • The present invention also provides reporting features superior to existing means of blocking and accessing Internet use, thus enhancing its usefulness and effectiveness. The report generated in the present invention is capable of reporting the Internet access activity of the user and may also provide a link on one portion of the report to allow the user to computerlink to and access information related to different Internet protocol activities on different portions of the report.
  • The software may be installed by down-loading the program directly from a remote server through an Internet connection or other suitable means, or may alternatively be installed manually by way of a pre-recorded media, such as a compact disc (CD). Before installing the program, the user may make certain pre-installation elections such as who will have the ability to unblock and permit access, who will be the recipient of information gathered with the program, how often reports will be updated and made available to either the user or a accountability partner, as well as other key parameters that will be discussed in more detail below.
  • Once the program has been installed on the first computer, this computer is communicatively connected to a server through an electronic connection, such as telephone lines, cable, fiber optics, electric power lines, or other suitable connection. When the user attempts to connect to the Internet, the user will be unable to gain access to the Internet without first establishing a connection with remote server, and without that server unblocking or permitting access as predetermined by accountability partner. During or after the initial installation of the program, the user may elect to have an automatic connection to remote server and thus always be available for unblocking of access to the Internet by the remote server. When the server permits access (at the direction of the Accountability Partner), the user may or may not have a prompt display on the screen of computer indicating that a password is required to enter the Internet. This password would then connect the first computer to remote server. The remote server may include any personal computer or other hardware system available and known in the art. Server may be a single server or include a “server cluster” containing multiple servers.
  • When the program is installed on the first computer, during any given session of Internet access, all Internet access activity of the user can optionally be recorded by the monitoring program onto the remote server. These activities may include the traditional web site protocols, such as hyper text transfer protocol (http) (i.e., web browsing activities), in addition to other protocols not presently able to be monitored by existing monitoring programs. These other protocols may include protocols used in file sharing programs (gnutella, fast track and other like programs), news group access or network news transfer protocol (nntp), chat room activity and peer to peer chats, file transfer protocols (ftp), and protocols for reading e-mail such as post office protocol 3 (pop3) and Internet message access protocol (IMAP), cell-phone and PDA (personal digital assistant protocol) and protocols for writing or sending emails such as simple mail transfer protocol (smtp). As other new protocols are developed, the system may be reconfigured to add monitoring and reporting capabilities for those as well. These may be added as program updates, new releases and the like. The Internet access activity being monitored may be routed over the Internet, compiled then stored in remote server or in a database contained within remote server.
  • The information processing performed by processing program may include sorting the access activity of the user, assembling a list of the Internet access activity, and assigning a score to each activity listed. In one scenario, a score may be assigned as a numeric indicator of the type of activity accessed. For instance, for a particular type of objectionable Internet activity accessed a high numeric score may be assigned such as a number between 15 and 20. Likewise, a non-objectionable Internet access activity may be assigned a low number such as 0 or 1. An analysis program within the processing program may analyze the Internet access activity and assign a score based on parameters such as key words and image content.
  • Alternatively, instead of the default scoring system, the user or recipient can pre-select key words and/or other selected parameters to use for scoring purposes. In this scenario, a program will run for that particular user that assigns the score to the Internet access activity listed in accordance with the desired scoring for that user. For example, the user or recipient may select words to be given a high numeric score (i.e., words considered objectionable to that user or recipient), and words to be given a low numeric score. A variety of other scoring parameters may be included such as scoring based on the time of day (or night) the user engaged in Internet access activity, or the size of the file accessed by the user. Again, the score may be higher for activities logged late at night as opposed to during the day. As an alternative to the scenario described above, the numeric scoring may be replaced with a relative scoring system. Under this type of scoring method, for a particular activity a letter or other symbol may be used that designates whether the activity is deemed objectionable or not.
  • Another feature of the program may include a comment section. The comment section may allow the user to type in a comment after engaging in a particular Internet access activity. For example, if the user conducted research for a school report, and visited a web site considered objectionable to the user, he may later access the report of that activity within remote server and type in a comment explaining the visit to that site. The comment may then appear on the report to alert the third party recipient of the reason for the activity listed on the report.
  • Together, this invention can be used, for example, to allow a parolee to have access only at times permitted by a remote parole officer; or to allow a pornography addict to call his Accountability Partner to allow access only on an as-needed basis to the Internet; or for a child to allow parents to establish appropriate times of Internet use; or other applications as may be appropriate.
  • Implementation could, for example, be for the Accountability Partner using any computer in the world with internet access to go to the Covenant Eyes Member Center, https://secure.cvnt.net/member/,Log In, and have a menu of selection for the User, which would permit the Accountability Partner to choose the amount of permitted time access, the times of day the access is permitted, whether such access is to be on a regular basis, and which Internet protocols are permitted. Alternatively, the Accountability Partner could provide his/her password by telephone, or by other electronic means.
  • Referring now to the figures, FIG. 1 is a schematic of a hardware configuration that can be used to implement the objectives of the present invention. As shown, the system has a first computer that is a user computer 20 that is communicatively connected at 30 to a server 22 by any networking means such as the Internet. Server 22 have a database and is similarly communicatively attached to a second computer 24 for use by an accountability partner. Further, user computer 20 is also communicatively attached to any data source 26 received through any type of Internet protocol. As used in the present invention as stated above, computer means any device that can process digital information such as a personal computer, PDA, cell-phone, and the like.
  • Referring now to FIG. 2, is shown a flow of a system that embodies the objectives of the present invention. The system starts at Step 40 and proceeds to Step 42 where the program installs on User Computer 20. As part of the installation the system proceeds to Step 44 where the system accesses Server 22 database so that at Step 46 Server 22 can verify user authenticity in Server 22 database. Next the system proceeds to Step 48 where Server 22 accesses its database to apply User computer 20 Internet access parameters from a pre-determined or subsequently-determined list received from the Accountability Partner Computer. The system then waits for User Computer to make an access request, which is found at Step 50.
  • When an access request is received by the system from User Computer 20, the system proceeds to Step 52 where Server 22 compares the request to the preset access parameters. The system then proceeds to Step 54 to determine if the request falls within the list of allowed access sites. If yes, the system proceeds to Step 56 where access to the site is allowed per the predetermined parameters (such as a time interval). If no at Step 54, the System proceeds to Step 58 where access to the site is denied.
  • From this point, the system at Step 58 may at Step 60 optionally record the request and the denial, which is either accessible or reported to the Accountability Partner Computer 24 then return back to Step 50 until the system is terminated. The system at Step 56 may at Step 62 optionally record the request and the access, which is either accessible or reported to the Accountability Partner Computer 24 then return back to Step 50 until the system is terminated.
  • While the invention has been described in conjunction with specific embodiments, it is evident that many alternatives, modifications and variations will be apparent to those skilled in the art in light of the foregoing description. Accordingly, the present invention attempts to embrace all such alternatives, modifications and variations that fall within the spirit and scope of the appended claims.

Claims (18)

1. A system providing accountability and blocking of Internet use of a selected user, comprising:
a remote server;
a first computer having an accountability and blocking of internet use software program installed and communicatively linked to said remote server, wherein said program is configured to continuously block all Internet access unless Internet access is permitted by the remote server; and
a second accountability partner computer communicatively linked to said remote server, wherein a set of parameters for allowing remote server to unblock access to said first computer is established.
2. The system of claim 1, wherein said Internet access activity includes access selected from the group consisting of network news transfer protocols, file sharing programs, file transfer protocols, chat room access, peer to peer chats, http, https, cell phone, PDA, and electronic mail activity.
3. The system of claim 1, wherein the second computer notifies the remote server, by password-protected notification by non-internet electronic means such as through a website, that Internet access to the user of the first computer is permitted for a selected duration of time.
4. The system of claim 1, wherein the second computer notifies the remote server, by password-protected notification by non-internet electronic means, that Internet access to the user of the first computer is permitted for a predetermining time interval.
5. The system of claim 4, wherein said non-internet electronic means is by telephone.
6. The system of claim 1, further comprising a monitoring system, wherein said monitoring program is configured to monitor Internet access activity of the first computer's user and record said Internet access activity within said remote server, and wherein said remote server includes a processing program, said processing program configured to analyze said recorded Internet access activity and generate a report of said Internet access activity, wherein said report includes a list of said recorded Internet access activity and a score assigned to each said recorded Internet access activity and is accessible by said second computer.
7. The system of claim 6, wherein a score is assigned as a numeric indicator of the type of activity accessed, further characterized wherein an objectionable internet activity is accessed a high numeric score and a non-objectionable internet activity may be assigned a low numeric score, based on parameters such as key words and image content.
8. The system of claim 1, further including a first database located within said remote server, and wherein said monitored Internet access activity is stored on said first database.
9. The system of claim 1, further comprising a toolbar on said first computer to allow message to said second computer to prompt a request.
10. The system of claim 1, further comprising a comment section allowing the user to type in a comment after engaging in a particular internet access activity.
11. A method for providing accountability and blocking of Internet use of a selected user, comprising the steps in FIG. 2 of:
installing a remote server,
installing a program on a first computer, wherein said program which is configured to continuously blocked all Internet access unless Internet access is permitted by the remote server,
installing a second computer, at which an Accountability Partner communicates to the remote server that Internet access is permitted, unblocking access to the person using said first computer,
installing a monitoring system, wherein said monitoring program is configured to monitor Internet access activity of the computer user and record said Internet access activity within said remote server,
accessing internet activity selected from the group consisting of http, https, network news transfer protocols, file sharing programs, file transfer protocols, chat room access, peer to peer chats, and electronic mail activity, cell phones and PDAS and;
processing a recorded Internet access activity; and transferring said recorded Internet access activity to a second database.
12. The system of claim 11, wherein said report displays said list of said recorded Internet access activity sorted chronologically.
13. The method of claim 11, wherein providing said report includes electronically sending said report to said third party recipient at pre-selected time intervals.
14. The method of claim 11, wherein said report contains a list of recorded Internet access activity of one of said Internet protocols, and further includes a computer link to connect to a portion of said report.
15. The method of claim 11, wherein providing said report includes electronically sending said report to said third party recipient at pre-selected time intervals, comprising further, assigning a score to said Internet access activity based on predetermined scoring criteria, wherein said score is assigned as a numeric indicator of the type of activity accessed, further characterized wherein an objectionable internet activity is accessed a high numeric score and a non-objectionable internet activity may be assigned a low numeric score, based on parameters such as key words and image content.
16. The method of claim 11, wherein the Accountability Partner may permit access on a regular basis, optionally, every day at the same time.
17. The method of claim 11, wherein the Accountability Partner notifies the remote server, by password-protected notification such as through a website, by PDA, telephone, or by other electronic means, that Internet access to the user of the first computer is permitted.
18. A computer-readable medium comprising instructions and whose content cause a computer system to perform accountability and blocking of Internet use of a selected user, by performing the steps of:
installing a remote server,
installing a program on a first computer, wherein said program which is configured to continuously blocked all Internet access unless Internet access is permitted by the remote server,
installing a second computer, at which an Accountability Partner communicates to the remote server that Internet access is permitted, unblocking access to the person using said first computer,
installing a monitoring system, wherein said monitoring program is configured to monitor Internet access activity of the computer user and record said Internet access activity within said remote server, and
accessing internet activity selected from the group consisting of http, https, network news transfer protocols, file sharing programs; file transfer protocols, chat room access, peer to peer chats, cell phone, PDA and electronic mail activity.
US11/491,918 2005-07-25 2006-07-25 Access of Internet use for a selected user Abandoned US20070061869A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/491,918 US20070061869A1 (en) 2005-07-25 2006-07-25 Access of Internet use for a selected user

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US70193805P 2005-07-25 2005-07-25
US11/491,918 US20070061869A1 (en) 2005-07-25 2006-07-25 Access of Internet use for a selected user

Publications (1)

Publication Number Publication Date
US20070061869A1 true US20070061869A1 (en) 2007-03-15

Family

ID=37856879

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/491,918 Abandoned US20070061869A1 (en) 2005-07-25 2006-07-25 Access of Internet use for a selected user

Country Status (1)

Country Link
US (1) US20070061869A1 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070130148A1 (en) * 2005-12-05 2007-06-07 Chao-Hung Wu Real-time overall monitor system
US20080013464A1 (en) * 2006-07-11 2008-01-17 Broadweb Corporation Method and system for blocking the specific function of the P2P application in the network
US20080126318A1 (en) * 2006-08-02 2008-05-29 Jason Frankovitz Method and Apparatus for Remotely Monitoring a Social Website
US20090178134A1 (en) * 2008-01-04 2009-07-09 Dehaas Ronald J System and method for blocking internet access and/or applications
US20100274799A1 (en) * 2007-10-24 2010-10-28 Yun-Seok Lee Method for permitting and blocking use of internet by detecting plural terminals on network
US7904554B1 (en) 2002-12-30 2011-03-08 Aol Inc. Supervising user interaction with online services
EP2413258A1 (en) * 2010-07-29 2012-02-01 Gemalto SA A method for controlling an action performed through or by a device, corresponding first device, server, system and method
US8346953B1 (en) 2007-12-18 2013-01-01 AOL, Inc. Methods and systems for restricting electronic content access based on guardian control decisions
US8504671B1 (en) * 2010-09-02 2013-08-06 Symantec Corporation Systems and methods for rating a current instance of data based on preceding and succeeding instances of data
US8776222B2 (en) 2000-12-29 2014-07-08 Facebook, Inc. Message screening system
US10230734B2 (en) * 2015-12-08 2019-03-12 Quest Software Inc. Usage-based modification of user privileges
US10523525B2 (en) * 2015-09-21 2019-12-31 Ruby Tech Corporation Network switch, device management system, and device management method thereof

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6052730A (en) * 1997-01-10 2000-04-18 The Board Of Trustees Of The Leland Stanford Junior University Method for monitoring and/or modifying web browsing sessions
US6397256B1 (en) * 1999-01-27 2002-05-28 International Business Machines Corporation Monitoring system for computers and internet browsers
US6449604B1 (en) * 1998-05-21 2002-09-10 Lucent Technologies Inc. Method for characterizing and visualizing patterns of usage of a web site by network users
US6606657B1 (en) * 1999-06-22 2003-08-12 Comverse, Ltd. System and method for processing and presenting internet usage information
US20030177389A1 (en) * 2002-03-06 2003-09-18 Zone Labs, Inc. System and methodology for security policy arbitration
US20040034502A1 (en) * 2001-03-21 2004-02-19 Changmo Jung Method for measuring time of accessing a web site through the internet and recording media for storing a program thereof
US6804334B1 (en) * 2000-05-19 2004-10-12 Lucent Technologies Inc. Method and device for dynamic message delivery based upon identification of originating caller
US20050086255A1 (en) * 2003-10-15 2005-04-21 Ascentive Llc Supervising monitoring and controlling activities performed on a client device
US20050108383A1 (en) * 2003-11-04 2005-05-19 Dehaas Ronald J. Internet use monitoring system and method
US20050240960A1 (en) * 2004-04-23 2005-10-27 Martinus Nagtzaam Method and apparatus for controlling child's internet use
US7349827B1 (en) * 2002-09-18 2008-03-25 Doubleclick Inc. System and method for reporting website activity based on inferred attribution methodology

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6052730A (en) * 1997-01-10 2000-04-18 The Board Of Trustees Of The Leland Stanford Junior University Method for monitoring and/or modifying web browsing sessions
US6449604B1 (en) * 1998-05-21 2002-09-10 Lucent Technologies Inc. Method for characterizing and visualizing patterns of usage of a web site by network users
US6397256B1 (en) * 1999-01-27 2002-05-28 International Business Machines Corporation Monitoring system for computers and internet browsers
US6606657B1 (en) * 1999-06-22 2003-08-12 Comverse, Ltd. System and method for processing and presenting internet usage information
US6804334B1 (en) * 2000-05-19 2004-10-12 Lucent Technologies Inc. Method and device for dynamic message delivery based upon identification of originating caller
US20040034502A1 (en) * 2001-03-21 2004-02-19 Changmo Jung Method for measuring time of accessing a web site through the internet and recording media for storing a program thereof
US20030177389A1 (en) * 2002-03-06 2003-09-18 Zone Labs, Inc. System and methodology for security policy arbitration
US7349827B1 (en) * 2002-09-18 2008-03-25 Doubleclick Inc. System and method for reporting website activity based on inferred attribution methodology
US20050086255A1 (en) * 2003-10-15 2005-04-21 Ascentive Llc Supervising monitoring and controlling activities performed on a client device
US20050108383A1 (en) * 2003-11-04 2005-05-19 Dehaas Ronald J. Internet use monitoring system and method
US20050240960A1 (en) * 2004-04-23 2005-10-27 Martinus Nagtzaam Method and apparatus for controlling child's internet use

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8776222B2 (en) 2000-12-29 2014-07-08 Facebook, Inc. Message screening system
US9621501B2 (en) 2000-12-29 2017-04-11 Facebook, Inc. Message screening system utilizing supervisory screening and approval
US9083666B2 (en) 2000-12-29 2015-07-14 Facebook, Inc. Message screening system utilizing supervisory screening and approval
US7904554B1 (en) 2002-12-30 2011-03-08 Aol Inc. Supervising user interaction with online services
USRE45558E1 (en) 2002-12-30 2015-06-09 Facebook, Inc. Supervising user interaction with online services
US20070130148A1 (en) * 2005-12-05 2007-06-07 Chao-Hung Wu Real-time overall monitor system
US20080013464A1 (en) * 2006-07-11 2008-01-17 Broadweb Corporation Method and system for blocking the specific function of the P2P application in the network
US20080126318A1 (en) * 2006-08-02 2008-05-29 Jason Frankovitz Method and Apparatus for Remotely Monitoring a Social Website
US9858341B2 (en) * 2006-08-02 2018-01-02 Jason Frankovitz Method and apparatus for remotely monitoring a social website
US20100274799A1 (en) * 2007-10-24 2010-10-28 Yun-Seok Lee Method for permitting and blocking use of internet by detecting plural terminals on network
US8230007B2 (en) * 2007-10-24 2012-07-24 Plustech Inc. Method for permitting and blocking use of internet by detecting plural terminals on network
US8346953B1 (en) 2007-12-18 2013-01-01 AOL, Inc. Methods and systems for restricting electronic content access based on guardian control decisions
US20090178134A1 (en) * 2008-01-04 2009-07-09 Dehaas Ronald J System and method for blocking internet access and/or applications
WO2012013720A1 (en) * 2010-07-29 2012-02-02 Gemalto Sa A method for controlling an action performed through or by a device, corresponding first device, server, system and method
EP2413258A1 (en) * 2010-07-29 2012-02-01 Gemalto SA A method for controlling an action performed through or by a device, corresponding first device, server, system and method
US8504671B1 (en) * 2010-09-02 2013-08-06 Symantec Corporation Systems and methods for rating a current instance of data based on preceding and succeeding instances of data
US10523525B2 (en) * 2015-09-21 2019-12-31 Ruby Tech Corporation Network switch, device management system, and device management method thereof
US10230734B2 (en) * 2015-12-08 2019-03-12 Quest Software Inc. Usage-based modification of user privileges

Similar Documents

Publication Publication Date Title
US20070061869A1 (en) Access of Internet use for a selected user
US8671192B2 (en) Internet use monitoring system
USRE45558E1 (en) Supervising user interaction with online services
US10630689B2 (en) Strong identity management and cyber security software
EP2074521B1 (en) Methods and apparatuses for managing resources within a virtual room
US9460299B2 (en) System and method for monitoring and reporting peer communications
US6947985B2 (en) Filtering techniques for managing access to internet sites or other software applications
US20090030985A1 (en) Family-based online social networking
US20040019656A1 (en) System and method for monitoring global network activity
US20120151047A1 (en) Communication monitoring system and method enabling designating a peer
US20040260801A1 (en) Apparatus and methods for monitoring and controlling network activity using mobile communications devices
US20090113014A1 (en) Device, Method and Computer Program Product for Providing an Alert Indication
US7366739B2 (en) Data storage system
US20080162692A1 (en) System and method for identifying and blocking sexual predator activity on the internet
JP2003150482A (en) Contents filtering method, contents filtering device and contents filtering program
WO2007069338A1 (en) Web access monitoring method and its program
EP1956777A2 (en) Method and system for reducing the proliferation of electronic messages
EP1531641B1 (en) A server apparatus
US20110231497A1 (en) Systems and methods for monitoring and notification of access and use of the internet
WO2021072449A1 (en) Method and apparatus to control and monitor access to web domains using networked devices
US20110231890A1 (en) Systems and Methods for Managing Internet Access
JP2022181684A (en) Program and information processing apparatus
US20090178134A1 (en) System and method for blocking internet access and/or applications
KR100395449B1 (en) The system for providing with the educational information
US8108491B2 (en) Method and system for control of access to global computer networks

Legal Events

Date Code Title Description
AS Assignment

Owner name: COVENANT EYES, INC., MICHIGAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:DEHAAS, RONALD J.;REEL/FRAME:025891/0278

Effective date: 20101202

STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION